The Latest in IT Security

Posts Tagged ‘potential victims’

The North American Securities Administrators Association has issued an alert warning potential investors of scammers using social networking sites like Facebook, Twitter LinkedIn and dating sites. The typical modus operandi of the scam is to approach groups and even individual users to attempt to gain trust and rapport. (We have warned several times in the […]

Read more ...

We saw several key developments in the new variant of DroidDreamLight, which we were able to analyze earlier this month. This new variant, found in a China-based 3rd party application store, comes off as applications such as a battery monitoring tool, task listing tool, and an application that lists the permissions used by installed applications. […]

Read more ...

The formula here attempts to explain a paradox in security analysis: If it is true that security is only as strong as its weakest link, why are not those who use insecure passwords, skip installing security patches, avoid updating or using antivirus software, and in general act insecure – not hacked and exploited continuously? Because they do not! […]

Read more ...


Categories

MONDAY, APRIL 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments